Solved

Monitor defacement of web site

Posted on 2014-10-05
2
167 Views
Last Modified: 2014-10-21
Wanna monitor my company website to see if the web page deface by hacker. What is the effective way to do this?
0
Comment
Question by:litmic
2 Comments
 
LVL 58

Expert Comment

by:Gary
ID: 40362886
Top of the list for website monitoring would be

http://sucuri.net/

Anything on your own server is unlikely to be of any use.
0
 
LVL 77

Accepted Solution

by:
arnold earned 500 total points
ID: 40362935
You can use md5sum to generate a digest of your existing site, then run a comparison of the data against the digest.

Shielding the server/s from direct access through the use of a reverse proxy, presenting the data to the web server in read-only mode (NFS share).

Maintaining the security on the server including updates will go a long way to manage this.

How many pages from your site are you looking to monitor for defacement? or are you only looking at the index.*

the simplest thing if you are only looking at one site, is to use a hidden parameter/line including a comment <!-- this is my site -->
if you query the page and your predefined "parameter" is not present your monitoring tool, nagios, zabix, etc. will generate an alert.

Maintaining a list of when the files are modified and then using the last_updated query for the page is another such tool but does not work if your page is dynamically generated.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Developer tools in browsers have been around for a while, yet they are still heavily underused by developers. Developers still fix html or CSS then refresh page to see effect, or they put alert or debugger in JavaScript and then try again and again …
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
The viewer will learn how to dynamically set the form action using jQuery.
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question